清晨好,您是今天最早来到科研通的研友!由于当前在线用户较少,发布求助请尽量完整的填写文献信息,科研通机器人24小时在线,伴您科研之路漫漫前行!

A Security Review in the UAVNet Era: Threats, Countermeasures, and Gap Analysis

计算机科学 无人机 计算机安全 欺骗攻击 恶意软件 形势意识 加密 领域(数学) 背景(考古学) 数学 遗传学 生物 工程类 航空航天工程 古生物学 纯数学
作者
Alessio Rugo,Claudio A. Ardagna,Nabil El Ioini
出处
期刊:ACM Computing Surveys [Association for Computing Machinery]
卷期号:55 (1): 1-35 被引量:38
标识
DOI:10.1145/3485272
摘要

Unmanned Aerial Vehicles (UAVs) are becoming one of the main technological supports for commercial applications, embracing many domains ranging from human safety to the medical field, agriculture and environment, multimedia production, and even commercial delivery. This rise in popularity, however, is causing an increasing interest from criminals, making UAVs the target of new attacks. To fully characterize the current UAV cybersecurity landscape, we perform a complete literature review, digging into drone security historic facts and scientific studies on the matter, reviewing specialized articles and scientific papers focusing on cybersecurity threats and gaps in the context of small UAVs in commercial applications. Being a recent research and development area, most of the articles have been published between 2016 and 2020 as a direct consequence of the increase of security concerns and interest in the drone field. Papers in this review deal with UAV cyberthreats and related vulnerabilities, identifying flaws experimented in a lab or describing incidents detected in the field. Communication, sensors, and system misconfigurations are among the most important threat vectors, while sensor spoofing/jamming and malware DoS/control are among the most cited threats. Threat vectors permit depicting a complete overview of the topic and potential countermeasures known to date, with related gap analysis, also accounting for the recent Unmanned Aircraft System evolution toward ad hoc or cloud-based UAV networks. Countermeasures include the adoption of traditional communication encryption and standard protocols, GPS spoofing/jamming mitigation, encryption and privacy-aware implementations, and counter-malware techniques, to name the most adopted. It also emerges that often attacks are simply ported or adapted from other attacks in similar domains, while peculiar attacks still remain such as targeted physical attacks, specific UAV malware, and GPS spoofing/jamming.
最长约 10秒,即可获得该文献文件

科研通智能强力驱动
Strongly Powered by AbleSci AI
科研通是完全免费的文献互助平台,具备全网最快的应助速度,最高的求助完成率。 对每一个文献求助,科研通都将尽心尽力,给求助人一个满意的交代。
实时播报
12秒前
没时间解释了完成签到 ,获得积分10
16秒前
万万发布了新的文献求助10
17秒前
31秒前
飞翔的荷兰人完成签到,获得积分10
33秒前
万万完成签到,获得积分10
41秒前
俊逸吐司完成签到 ,获得积分10
54秒前
59秒前
小袁搜题发布了新的文献求助10
1分钟前
田様应助JueruiWang1258采纳,获得10
1分钟前
1分钟前
1分钟前
无悔完成签到 ,获得积分10
1分钟前
1437594843完成签到 ,获得积分10
1分钟前
a_spoon发布了新的文献求助20
1分钟前
刘刘完成签到 ,获得积分10
1分钟前
a_spoon完成签到,获得积分10
1分钟前
2分钟前
小袁搜题完成签到,获得积分10
2分钟前
红茸茸羊完成签到 ,获得积分10
2分钟前
大英留子千早爱音完成签到,获得积分10
2分钟前
0323完成签到,获得积分10
2分钟前
可夫司机完成签到 ,获得积分10
3分钟前
3分钟前
生动雁发布了新的文献求助10
3分钟前
0323发布了新的文献求助10
3分钟前
诺亚方舟哇哈哈完成签到 ,获得积分0
3分钟前
3分钟前
wj完成签到 ,获得积分10
4分钟前
dandan完成签到,获得积分10
4分钟前
莽哥完成签到,获得积分10
4分钟前
4分钟前
vbnn完成签到 ,获得积分10
4分钟前
4分钟前
喜悦的水云完成签到 ,获得积分10
4分钟前
wangye完成签到 ,获得积分10
5分钟前
violetlishu完成签到 ,获得积分10
6分钟前
1250241652完成签到,获得积分10
6分钟前
7分钟前
传奇3应助科研通管家采纳,获得10
7分钟前
高分求助中
Production Logging: Theoretical and Interpretive Elements 2500
Востребованный временем 2500
Aspects of Babylonian celestial divination : the lunar eclipse tablets of enuma anu enlil 1500
Agaricales of New Zealand 1: Pluteaceae - Entolomataceae 1040
Healthcare Finance: Modern Financial Analysis for Accelerating Biomedical Innovation 1000
Classics in Total Synthesis IV: New Targets, Strategies, Methods 1000
体心立方金属铌、钽及其硼化物中滑移与孪生机制的研究 800
热门求助领域 (近24小时)
化学 医学 材料科学 生物 工程类 有机化学 生物化学 纳米技术 内科学 物理 化学工程 计算机科学 复合材料 基因 遗传学 物理化学 催化作用 细胞生物学 免疫学 电极
热门帖子
关注 科研通微信公众号,转发送积分 3450460
求助须知:如何正确求助?哪些是违规求助? 3045952
关于积分的说明 9003759
捐赠科研通 2734604
什么是DOI,文献DOI怎么找? 1500090
科研通“疑难数据库(出版商)”最低求助积分说明 693334
邀请新用户注册赠送积分活动 691477